doauthenticate.c 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include "../boot/boot.h"
  5. static char *pbmsg = "AS protocol botch";
  6. static char *ccmsg = "can't connect to AS";
  7. long
  8. readn(int fd, void *buf, long len)
  9. {
  10. int m, n;
  11. char *p;
  12. p = buf;
  13. for(n = 0; n < len; n += m){
  14. m = read(fd, p+n, len-n);
  15. if(m <= 0)
  16. return -1;
  17. }
  18. return n;
  19. }
  20. static char*
  21. fromauth(Method *mp, char *trbuf, char *tbuf)
  22. {
  23. int afd;
  24. char t;
  25. char *msg;
  26. static char error[2*ERRMAX];
  27. if(mp->auth == 0)
  28. fatal("no method for accessing auth server");
  29. afd = (*mp->auth)();
  30. if(afd < 0) {
  31. sprint(error, "%s: %r", ccmsg);
  32. return error;
  33. }
  34. if(write(afd, trbuf, TICKREQLEN) < 0 || read(afd, &t, 1) != 1){
  35. close(afd);
  36. sprint(error, "%s: %r", pbmsg);
  37. return error;
  38. }
  39. switch(t){
  40. case AuthOK:
  41. msg = 0;
  42. if(readn(afd, tbuf, 2*TICKETLEN) < 0) {
  43. sprint(error, "%s: %r", pbmsg);
  44. msg = error;
  45. }
  46. break;
  47. case AuthErr:
  48. if(readn(afd, error, ERRMAX) < 0) {
  49. sprint(error, "%s: %r", pbmsg);
  50. msg = error;
  51. }
  52. else {
  53. error[ERRMAX-1] = 0;
  54. msg = error;
  55. }
  56. break;
  57. default:
  58. msg = pbmsg;
  59. break;
  60. }
  61. close(afd);
  62. return msg;
  63. }
  64. void
  65. doauthenticate(int fd, Method *mp)
  66. {
  67. char *msg;
  68. char trbuf[TICKREQLEN];
  69. char tbuf[2*TICKETLEN];
  70. print("session...");
  71. if(fsession(fd, trbuf, sizeof trbuf) < 0)
  72. fatal("session command failed");
  73. /* no authentication required? */
  74. memset(tbuf, 0, 2*TICKETLEN);
  75. if(trbuf[0] == 0)
  76. return;
  77. /* try getting to an auth server */
  78. print("getting ticket...");
  79. msg = fromauth(mp, trbuf, tbuf);
  80. print("authenticating...");
  81. if(msg == 0)
  82. if(fauth(fd, tbuf) >= 0)
  83. return;
  84. /* didn't work, go for the security hole */
  85. fprint(2, "no authentication server (%s), using your key as server key\n", msg);
  86. }
  87. char*
  88. checkkey(Method *mp, char *name, char *key)
  89. {
  90. char *msg;
  91. Ticketreq tr;
  92. Ticket t;
  93. char trbuf[TICKREQLEN];
  94. char tbuf[TICKETLEN];
  95. memset(&tr, 0, sizeof tr);
  96. tr.type = AuthTreq;
  97. strcpy(tr.authid, name);
  98. strcpy(tr.hostid, name);
  99. strcpy(tr.uid, name);
  100. convTR2M(&tr, trbuf);
  101. msg = fromauth(mp, trbuf, tbuf);
  102. if(msg == ccmsg){
  103. fprint(2, "boot: can't contact auth server, passwd unchecked\n");
  104. return 0;
  105. }
  106. if(msg)
  107. return msg;
  108. convM2T(tbuf, &t, key);
  109. if(t.num == AuthTc && strcmp(name, t.cuid)==0)
  110. return 0;
  111. return "no match";
  112. }